- RSS Feeds provide links and content to RSS
apps and aggregators
- Malicious links and content can be delivered via
the RSS method
- Can be used to deliver XSS and XML Injection
attacks
- Can be used to deliver malicious code (Both
Script and encoded Binary)
Kindle Reading Device
Tuesday, July 7, 2009
E-mail security policies
[Numbers published in Information Security , May 2008 Issue. Original Source: Webroot survey of 1,494 organizations]
According to a survey by Webroot, some of the more common e-mail security policies have to do with prohibiting access to personal e-mail accounts from the office or stowing away corporate e-mails to such accounts. The next common strategy is to enforce a global confidential signature, essentially a signature that is automatically appended to all outgoing mails stating the corporate confidential policy.
Subscribe to:
Posts (Atom)